What caused your authenticity to be compromised?
是什么导致你的真实性妥协掉了?
A test has revealed that a Linux server is far less likely to be compromised.
近日,一项安全测试表明Linux的服务器被攻陷的可能性是很低的。
As your work schedule became so full, your ability to see new courses had to be compromised.
7当你的工作日程。变得如此充分,你能够看到新课程已受到影响。
After all, with all those "elements" flying around everywhere, something has to be compromised.
毕竟,所有这些内容到处都是,但要受到了损害。
FOS1 function in japonica appears to be compromised by a functional nucleotide polymorphism (FNP) at the putative processing site of the signal peptide.
位于信号肽加工位点的一个功能性核苷酸多态性(FNP)可能影响了FOS1在粳稻中的功能。
At present the needs of women with common perinatal mental disorders are unrecognized and not attended to and their participation in essential antenatal preventive care appears to be compromised.
目前,对于患有围产期常见精神障碍的妇女来说,她们的需求还未得到人们的充分认识和关注,并且让她们参加必要的产前预防保健护理似乎十分困难。
He mentioned that the company had required "all accounts we believed to be compromised" to reset their passwords in 2012, and that it recommended all other users else reset their passwords as well.
他表示,在2012年的泄露事故发生后,领英公司已经要求“所有我们认为已经泄露的账户”修改其密码。另外,当时领英还向所有用户发出了修改密码的建议。
Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.
审计日志是多种入侵检测系统的重要信息来源,因而审计系统就成为黑客或攻击者对付的主要目标。
Once again, these types of files are very un-secure and you will need to take extra precautions to ensure that the data in these files cannot be compromised.
再一次告诉您,这些文件类型都非常不安全,您需要采取额外的预防措施来保证这些文件中的数据不会受到危害。
Physical access to your servers and your databases may be compromised allowing an unauthorized user to access them.
对服务器和数据库的物理访问可能受到危害,使未授权用户得以访问它们。
If some other party discovered the secret, though, the message exchange would be compromised, with potentially devastating results for the parties to the exchange.
但是,如果其他方发现了这个秘密,那么消息交换就会泄漏,并会为消息交换方带来潜在的破坏性结果。
The reality is that 3gl teams must be so specialized and focused on these foundation layers of the application that their ability to deliver core functionality can be compromised.
实际情况是,3gl团队必须非常专业并专注应用程序的这些基础层,他们交付核心功能的能力可能会受到损害。
It has called for the run-off, whose legitimacy it sees as already "severely compromised", to be suspended in favour of negotiations.
它已经呼吁暂停选举而进行谈判,因为在它看来,这次选举的合法性已经带来了“严重阻碍”。
On the other hand, if I include the realm name and username, a key that falls victim to such an attack will only be compromised in one particular realm.
另一方面,如果我加入了域名和用户名,那么一个受到这种攻击的密钥将只会侵害特定的域。
Compromised machines can then be linked up to form "botnets" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.
接下来,感染病毒的电脑被连起来形成“僵尸网络”,并被外部控制。“僵尸网络”能被用来发送垃圾邮件或者发动能使网站瘫痪的洪水攻击。
This is not, he argues, because classified intelligence information might be compromised but because the torture to which he says they have been subjected would be exposed.
他认为,这不是因为可能泄露机密情报的缘故,而是因为他们所遭受的拷问可能会大白于天下。
However, some experts are beginning to wonder how safe and anonymous this data is and how much end-user privacy could be compromised.
但是有些专家开始担心智能电网数据的安全和匿名性,以及终端用户隐私遭到侵犯的程度。
Security - Clean images can be used to restore compromised systems.
安全——干净的镜像可用来重建受损的系统。
If the peacekeepers hand them over, their avowed mission to protect civilians could be fatally compromised.
如果维和警察交出这些人,那么承诺保卫平民的使命将遭受致命危害。
If two ca's were to issue certificates with the same DN, our security would again be compromised.
如果两个ca签发了具有相同dn的证书,我们安全性机制将无法起作用。
He knew that if either failed, Ford's access to parts would be severely compromised.
他清楚,任何一家如果倒闭,福特取得零部件将会受到致命的威胁。
Once the disc decides the player is legitimate and hasn't been compromised, it allows the movie it contains to be decrypted for playback.
一旦碟片认为播放机是合法的而且没被破解,它就会允许解码和播放碟上的影片。
The compromised data included names and email addresses, covering letter and CVs, and some of the information was thought to be up to two years old.
受到攻击的数据包括用户姓名及电子邮箱地址,介绍信,个人简历及一些两年前的信息。
Risky-food consumption also appeared to be higher among children with compromised immune systems than among healthy children.
“危险”食物消费在免疫功能较弱的儿童群体食用比例要高于在健康儿童群体。
With the system compromised, the attacker carries out whatever the next step may be-whether it's to gather data or compromise another system.
系统被破坏后,攻击者将实施以下任一步骤——收集数据或破坏另一个系统。
We know that part of the equation should be to think ahead (providing a solid design and architecture), but quality is usually compromised because of budget and deadline concerns.
我们知道合适的方案必须是要提前计划好的(提供可靠的设计和架构),但由于预算和期限的问题,我们常常不得不牺牲质量。
This kind of safety can be provided to applications even if their operating system is fundamentally compromised by malware.
即使安装应用程序的操作系统从根本上已经被黑客软件所劫持,此类的安全措施仍能被加载于运用程序上。
This kind of safety can be provided to applications even if their operating system is fundamentally compromised by malware.
即使安装应用程序的操作系统从根本上已经被黑客软件所劫持,此类的安全措施仍能被加载于运用程序上。
应用推荐